The innovations in cyberthreats are flooding and Mirai shows that even the most common form of attack like a distributed denial-of-service (DDoS) can deal great damage on many industries. Mirai stands at the top of today’s IoT threats, a malicious worm that targets smart devices within your home. Mirai was involved in some of the largest cyberattacks ever recorded. In 2016, hackers managed to penetrate thousands of household networked things like printers, baby monitors, and…

Cloud is the driving force of digital transformation and with data jumping in value every second, it will stay that way for a very long time. With that in mind, Microsoft revealed its secret weapon in the current cloud wars: Azure Stack. Azure Stack is an extension of Azure with one key idea: it focuses on on-premise environments. This means that existing infrastructures can now have the same environment as those fully-operating in the cloud….

Experts predict that there will be 200 billion connected things by 2020. The last decade seemed like a race on who can put the most software into anything and it changed the way we live and do things. As it continues to penetrate every aspect of human life, we as humans also continue to depend on it. A nice thought, except that this dependence also results into a lot of digital vulnerabilities. This puts cybersecurity…

July 10, 2017, Washington, D.C. — Microsoft together with its partners worldwide have gathered in the biggest digital transformation event of the year: Microsoft Inspire 2017 which was held at Walter E. Washington Convention Center, Washington, D.C. It became an opportunity for every innovator to meet and connect with the goal of pushing digital transformation further. Formerly the Microsoft Worldwide Partner Conference, the newly named event offers the experiences, insight and innovation you’ve come to…

With the rise of cybercrimes in the recent months, there’s only so much that the regular user can do to keep himself/herself protected. Passwords have been here ever since we’ve started using accounts for anything: bank accounts, social media platforms, and emails. It’s the first line of defense against any threat, and strengthening it is one of the most important and accessible safety measure that anyone can do. With that in mind, here are 7…

Petya might be more than just your everyday ransomware attack. According to Gizmodo, NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE) announced that the attack is believed to be a potential act of cyber war. At this point in time, it is clear that it uses the same exploit as WannaCry (EternalBlue and EternalRomance) that were leaked from the National Security Agency of America (NSA) by Shadow Broker. This has led to most…

June 21, 2017, Hilton Colombo — Tech One Sanje together with Microsoft initiated an event titled “Cloud today. Success Tomorrow” to take digital transformation to its next steps: exploring cloud capabilities. The cloud has been a centerpiece in the overall canvass of digital transformation. It’s where many functions are taking place: software development, testing, deployment, and plain old storage. It’s also evolving through time, enough for it to emulate hardware power and bandwidth on par…